Sciweavers

20175 search results - page 157 / 4035
» Is abstraction the key to computing
Sort
View
CRYPTO
2000
Springer
128views Cryptology» more  CRYPTO 2000»
15 years 5 months ago
The XTR Public Key System
This paper introduces the XTR public key system. XTR is based on a new method to represent elements of a subgroup of a multiplicative group of a finite field. Application of XTR ...
Arjen K. Lenstra, Eric R. Verheul
131
Voted
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
16 years 1 months ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs
89
Voted
EUROPAR
2008
Springer
15 years 2 months ago
Co-design of Distributed Systems Using Skeleton and Autonomic Management Abstractions
nomic Management Abstractions M. Aldinucci1 , M. Danelutto1 , and P. Kilpatrick2 1 Dept. Computer Science, Univ. of Pisa, Italy 2 Dept. Computer Science, Queen's Univ. of Belf...
Marco Aldinucci, Marco Danelutto, Peter Kilpatrick
ACMSE
2006
ACM
15 years 7 months ago
Security issues in privacy and key management protocols of IEEE 802.16
Without physical boundaries, a wireless network faces many more security threats than a wired network does. Therefore, in the IEEE 802.16 standard a security sublayer is specified...
Sen Xu, Manton M. Matthews, Chin-Tser Huang
CLOUDCOM
2010
Springer
14 years 9 months ago
LEEN: Locality/Fairness-Aware Key Partitioning for MapReduce in the Cloud
This paper investigates the problem of Partitioning Skew1 in MapReduce-based system. Our studies with Hadoop, a widely used MapReduce implementation, demonstrate that the presence ...
Shadi Ibrahim, Hai Jin, Lu Lu, Song Wu, Bingsheng ...